USC Data Science Program 529 (DSci 529): Security and Privacy in Informatics - Spring 2021
Lecture Friday - Noon to 3:20PM PM
Clifford Neuman
Current Events for February 5 2021
Privacy and Tellecommunication Providers
ATT sells location data to bounty hunters! - Joseph Cox, Vice January 8 2019
Mobile carrier providers operate an infrastructure that keeps users connected to the internet regardless of movement in time and space. This service is partly achieved by tracking location in relation to cell tower infrastructure through signal strength, triangulation, and other techniques. Oddly, some of these providers sell this time stamped location data to interested parties for profit, including to bounty hunters. – Francisco Ventura (submitted last week)
Customer data stolen in hack targeting UScellular - Duncan Riley, Silicon Angle, 31st January 2021
United States Cellular Corp., the country’s fourth-largest wireless carrier, has been hacked with customer information stolen. The hacking happened with a combination of social engineering and trojan horse method. - Nana Andriana
Government Use of Data
Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says
By Charlie Savage, New York Times, 01/21/2020
Government agencies are required to obtain a warrant to get access to the customer locations from phone companies. The government agencies use a loophole in privacy law and purchase aggregated location information from brokers. The Defense Intelligence Agency has been buying aggregated location information from brokers and have searched for locations of Americans five times in the last two and a half years.
- Arzu Karaer
Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says -Charlie Savage, New York Times Digital Privacy Jan.22, 2021
DIA analysts have been using smartphone location data for investigation without warrants. The data was commercially available and bought from brokers. This indicates a loophole in a previous ruling in 2018 that says 'the government needs to obtain a warrant to compel phone companies to turn over location data about their customers.' -Gan Xin
Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants - Charlie Savage, New York Times, 1/22/2021
As per a memo obtained by the NYT, Defense Intelligence members have been able to comercially buy databases containing location data of American smartphone app users and track movements without a warrant. This indicates a massive loophole in a 2018 ruling by the Supreme Court that mandated the government to obtain a warrant before phone companies could turn their data over about their customers, as the government seeks out third-party brokers, for which they do not need a warrant. – Tanmay Ghai
California legislation targets police use of license plate readers - Kari Paul, The Guardian January 12th, 2021
As we talked in class, USC uses Automated License Plate Reader (ALPRs) to collect large amounts of data and track real movement of people entering the campus and leaving the campus. This is very interesting since California is one of the states of which the police department uses ALPRs as well as USC. This collects a lot of data but is only related to a fraction of actual crime. — Saurabh Jain
Malicious Software
New Malware Raindrop Discovered - Ravie Lakshmanan, The Hacker News, 1-19-2021
This is the fourth malware strain to be discovered linked to the Solar Winds supply chain attack. It is shellcode only with an AES encrypted payload that is stored at predetermined locations within the machine code. The malware appears to be of Russian origin, and is used throughout the network to allow attackers to move laterally across the network and deploy payloads on other devices. - Vartan Batmazyan (submitted last week)
Over a Dozen Chrome Extensions Caught Hijacking Google Search Results for Millions - Ravie Lakshmanan, The Hacker News, 2-3-2021
Called CacheFlow by Avast, these extensions in question leveraged the Cache-Control HTTP header in order to pull commands from a remote malicious server and execute on the host device.While specifically designed to not affect victims that the extension evaluated to be web developers and to not exhibit any strange behavior in the first three days post installation, on average victims they used the CacheFlow exploit to retrieve users' birthdays from https://myaccount.google.com/birthday as well as inject javascript into browser tabs to redirect users clicking on legitimate sites to potentially malicious ones. The extensions have been removed from the official extension store since 12-18-2020 despite there being evidence suggesting that the extensions might have been active since October of 2017. -Vartan Batmazyan
DDoS attacks leverage Plex media server - Joe Uchill - SC Media 02/04/2021
Recently, the Plex media server was under a spate of distributed denial-of-service (DDoS) attacks. It uses a universal plug and play (UPnP), which relies on the simple service discovery protocol (SSDP) to allow systems on the same network to seek each other and share files. However, attackers can leverage exposed SSDP to conduct attacks. Thus, Plex has been suggested that the servers could use architectures like central directory service other than UPnP to increase the security with similar functionality. - Ye Zeng
Nation State Activities
New campaign targeting security researchers - Adam Weidemann, Google Threat Analysis Group, January 25, 2021
North Korean campaign to target security researchers on Twitter, Discord, and other social media platforms. Threat actors built security research blogs and created fake videos to post on Twitter for credibility. They would then contact security researchers to "collaborate" with them on an exploit or a project they were "working on". In some cases, VS project files would be provided that would contain malware. In other cases, following a link on Twitter to their blog would lead to a malicious service being installed on the targeted’s system with a backdoor. - Jonathan De Leon
Briden Cracks Down on Russia - Cyber Scoop 02/4/2021
After 2016, the Russians have been implicated frequently for meddling in American affairs through cyber attacks. Biden has pledged to be more strict in cyberspace, and no longer "roll over" to attacks from the Russians. No major policies have been set in stone, but Biden confronted Putin via telephone within the past weeks. - Griffin Weinhold
The Executive Branch and US Government Policy
The Peloton Problem, The Guardian 01/21/2021
Like plenty of Americans, the new president of the free world likes to get his cardio in on his Peloton. US officials worry this poses a significant security threat to the White House since Peloton is not a closed system, and connects to the internet despite stalwart firewalls. On top of overall internet access, the microphone and video integration within Peloton possesses a further risk. - Griffin Weinhold (submitted last week)
Americans Won’t Be Banned From Investing in Alibaba, Tencent and Baidu - Jing Yang, Dawn Lim and Gordon Lubold - Wall Street Journal 1/13/2021
The US government is allowing Americans to continue investing in Chinese companies Alibaba, Tencent, and Baidu, after considerations to blacklist the companies over national security concerns. Previously, these companies were included in a list of firms alleged, by the Department of Defense, of supporting China's military, intelligence, and security services. However, with their combined 1.4 trillion market cap, it was decided that the economic fallout of such divestment weighed greater than the risks posed by the companies' alleged involvement with the chinese military -- Philana Williams (submitted last week)
Limiting Access to Sensitive Government Information - Lara Seligman and Bryan Bender, Politico, 1/20/2020
As the executive branch changes this week, more details have been released as to the extent of the efforts to limit the incoming administration to sensitive information. The topics withheld include but are not limited to; the Solarwinds Hack, troop drawdown in Afghanistan, the Covid vaccine development plan (called Operation Warp Speed), covert operations in Africa, withdrawal of troops in Somalia, budgetary requests, and a deal with United Arab Emirates for the F-35 fighter jet. It is unclear what damage this lack of access to information will have on homeland security. – Emily Christiansen (submitted last week)
Facebook
WhatsApp Has Shared Your Data With Facebook for Years, Actually - Lily Hay Newman, Wired 1/8/2021
WhatsApp updated its terms of use and privacy policy, and notified users by sending pop-ups for them to accept. Part of the update was users could choose to not share certain information with Facebook. Users worried about how much data would flow between WhatsApp and Facebook since Facebook acquired WhatsApp in 2014. WhatsApp started sharing information and metadata with Facebook after WhatsApp updated its privacy policy in August 2016. – Tian Yang
Google
Google announces plan to tackle privacy issues in online advertising - Alex Hern, The Guardian 01/25/2021
Google will soon begin experiments in Chrome on its new “privacy sandbox” to find a middle ground between blocking all potential surveillance and the needs of advertisers. The new approach manages to use AI and a “trusted server” to let advertisers target ads without the vast surveillance ecosystem. A major difficulty for this approach is to ensure that the ads industry is not circumventing true user privacy. – Haonan Xu
chrome cookie update advertisers google - Matt Burgess - 02/03/2021
Google Chrome is making plans to remove all third party cookies, by 2022, in light of growing security and privacy concerns. As an alternative, Google is planning on sending targeted ads using its own AI system called Federated Learning of Cohorts (FLoC). The new system would use web browsing history, and other data points owned by Google to classify users based on their interests. However, critics of the change say that Google risks putting smaller ad firms, and websites that rely on ads out of business, all while reaping the benefits of a larger market of the web advertisement business.
-- Philana Williams
Google says it may have found a privacy-friendly substitute to cookies - Sara Fischer, AXIOS 1/25/21
The story explains Google has been testing a new API called FLoC to replace third-party cookies. FLoC will use first-party data, or data uploaded to a site directly from the user to target ads instead so that the privacy of users can be protected and privacy concerns will be decreased. - Yi Jin
Google says Chrome cookie replacement plan making progress - Author(Via AP news wire), Source(INDEPENDENT) 01/25/2021
Third-party cookies have been a longtime source of privacy concerns.
A year ago, Google said that it would do away with them.
Few days ago, Google says they have updated its work progress and will delete so-called third-party cookies from the Chrome browser which are used by a website's advertisers or partners and can be used to track a user's internet browsing habits.
The new technology will eliminate “individual identifiers" and instead groups users into large demographic flocks.